Tools

Access EIP data through the CLI, AI integrations, and REST API. All tools are free, open, and require no authentication.

eip-search CLI

Terminal

A modern searchsploit replacement for CVE and exploit research. Search 339K+ CVEs and 77K+ exploits with CVSS scores, EPSS exploitation probability, CISA KEV status, ransomware attribution, and ranked exploit code from ExploitDB, Metasploit, GitHub, and more.

macOS Kali / Debian Windows Arch Offline mode

MCP Server

AI Integration

Connect AI assistants to real-time vulnerability intelligence via the Model Context Protocol. 17 tools for searching vulnerabilities, analyzing exploits, auditing tech stacks, and generating pentest findings. Live remote endpoint at mcp.exploit-intel.com - no installation required.

Claude Desktop Claude Code Cursor 17 tools Remote MCP

REST API

Developer

Free, public REST API for programmatic access to the vulnerability and exploit database. No authentication or API keys required. Search vulnerabilities with full-text queries, filter by severity, CVSS, EPSS, vendor, product, CWE, and more. Browse exploits, authors, and download code.

No auth JSON RSS feeds exploit-intel.com/api/v1

Rate Limits

Usage Policy

API and web rate limits, abuse protection policies, and response headers. General API: 60 requests/min. Search: 30/min. Exploit downloads: 30/min. Automated abuse detection with temporary bans at the Cloudflare edge.

60 req/min Per IP X-RateLimit headers